toggle

AAPL Stock: 117.89 ( -0.74 )

Printed from http://www.macnn.com

Apple issues Security Update 2006-004

updated 04:40 pm EDT, Tue August 1, 2006

Apple Security Update

Apple today issued Security Update 2006-004, addressing numerous issues in Mac OS X Panther/Tiger Clien and Server. The update affects AFP Server, AppKit, ImageIO, Bluetooth Setup Assistant, Bom, DHCP, dyld, fetchmail, gunzip, Image RAW, LaunchServices, OpenSSH, telnet, WebKit, and AppKit. Users can update Mac OS X via the Software Update pane in System Preferences or head to Apple's website to obtain the necessary fixes. [updated]

AFP Server

An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X 10.3.9
by ensuring that search results only include items for which the user is authorized. For Mac OS X 10.4 systems, the issue was addressed in Mac OS X 10.4.7.

The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or aribtrary code execution with system privileges. The AFP server is not enabled by default on Mac OS
X. This update addresses the issue by performing additional validation. Apple offers credit to Dino Dai Zovi of Matasano Security for reporting this issue.

On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access
files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server.

An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition.

AppKit, ImageIO

Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X 10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Apple offers credit to Tavis Ormandy, Google Security Team for reporting this issue. Note: A fifth issue discovered by Tavis Ormandy, CVE-2006-3460, does not affect Mac OS X.

Bluetooth Setup Assistant

The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. This enhancement does not require a CVE ID.

Bom

An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari
will automatically open archives when "Open 'safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Apple offers credit to Tom Ferris of Security-Protocols.com for reporting this issue.

DHCP

A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking.

dyld

Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Apple offers credit to Neil Archibald of Suresec for reporting this issue.

An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Apple offers credit to Neil Archibald of Suresec for reporting this issue.

fetchmail

Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website. This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility.

gunzip

A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing.

A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip - -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing.

Image RAW

By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X 10.4.

ImageIO

By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X 10.4.

By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect
systems prior to Mac OS X 10.4.

By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X 10.4. Apple offers credit to Tom Ferris of Security-Protocols.com for reporting this issue.

LaunchServices

Download Validation may erroneously identify certain files containing HTML as "safe." If such a file is downloaded in Safari and Safari's "Open 'safe' files after downloading" option is enabled, the HTML document will
automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X 10.4.

OpenSSH

Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X 10.4. Apple offers credit to Rob Middleton of the Centenary Institute in Sydney, Australia for reporting this issue.

telnet

When connected to a telnet server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has
explicitly requested are shared with the server. Apple offers credit to Gael Delalleau and iDEFENSE for reporting this issue.

WebKit

A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Apple offers credit to Jesse Ruderman of Mozilla Corporation for reporting this issue.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

MacNN Sponsor

Recent Reviews

Plantronics BackBeat Pro Bluetooth headphones

Looking for a pair of headphones that can do everything a user requires is a task that can take some study. Trying to decide on in-ear ...

MaxUpgrades 512GB Retina MacBook Pro SSD

Apple's Retina line of MacBook Pro notebooks have been impressive, right from their debut in 2012. Thinner than the previous model, t ...

Lemur BlueDriver

"Oh no, the check engine light is on…again! What one of the hundreds of reasons could it be this time? Probably going to cost a for ...

toggle

Most Commented